State of the Art Analysis of Network Traffic Anomaly Detection

被引:0
作者
Roy, Debdutta Barman [1 ]
Chaki, Rituparna [2 ]
机构
[1] Univ Calcutta, Comp Sci & Engn, Kolkata 700073, W Bengal, India
[2] Univ Calcutta, Informat Technol, Kolkata 700073, W Bengal, India
来源
2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC) | 2014年
关键词
Network Traffic; Anomaly; Statistical; Machine learning; Streaming Data Analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the present age of pervasive computing, network anomaly detection has become an essential research area. The idea behind anomaly detection originated from the perspective of network monitoring and security As more and more people and devices get connected over the net, the need for security of information being exchanged increases.. In network monitoring, the monitoring device observes such network features like flow and capacity of a link in network, number and size of distinct flows. Where as in network security the monitoring node monitors the anomalous behavior of the nodes. In this paper we present a review of some of the existing research works on anomaly detection.
引用
收藏
页码:186 / 192
页数:7
相关论文
共 41 条
[1]  
Adaniya Mario H. A. C., 2012, IEEINTERNATIONAL C C, P1183
[2]  
[Anonymous], P ACM SIGCOMM PHIL P
[3]  
[Anonymous], 2001, Pattern Classification
[4]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[5]   Detection and Classification of Traffic Anomalies Using Microscopic Traffic Variables [J].
Barria, Javier A. ;
Thajchayapong, Suttipong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2011, 12 (03) :695-704
[6]   What's new: Finding significant differences in network data streams [J].
Cormode, G ;
Muthukrishnan, S .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2005, 13 (06) :1219-1232
[7]  
Cormode G., 2004, P IEEE INFOCOM
[8]  
Estan C., 2002, P ACM SIGCOMM NEW YO
[9]   Scaling analysis of conservative cascades, with applications to network traffic [J].
Gilbert, AC ;
Willinger, W ;
Feldmann, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (03) :971-991
[10]  
Huang L., 2007, P 26 ANN IEEE C COMP